Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $75,573
85%  
Woo hoo!! And we're now over 85%!! Thank you all very much!!

Keyword: computer

Brevity: Headers | « Text »
  • Need Help with Opera Spell Checking

    08/26/2015 5:39:35 PM PDT · by Bigg Red · 20 replies
    My lame abilities ^ | 26 August 2015 | self
    When I compose a comment here or on Facebook, the spelling check function underlines every single word in red. Problem began about 1 week ago and occurs only when I am using Opera. I went to the Opera settings, but I could not find a way to correct this. Sorry, I am not tech savvy, and I would appreciate advice from someone who is.
  • DIY Tractor Repair Runs Afoul Of Copyright Law

    08/18/2015 11:31:17 AM PDT · by Theoria · 35 replies
    NPR ^ | 18 Aug 2015 | Laura Sydell
    The iconic image of the American farmer is the man or woman who works the land, milks cows and is self-reliant enough to fix the tractor. But like a lot of mechanical items, tractors are increasingly run by computer software. Now, farmers are hitting up against an obscure provision of copyright law that makes it illegal to repair machinery run by software. Take Dave Alford. He fits that image of the iconic farmer. "I do farming on the family ranch," says Alford, standing on a piece of grassy earth with a white barn behind him. "I've been farming for the...
  • Windows 10 appears to be mainly spyware - I'm uninstalling Windows 10 and going back to Windows 7

    08/08/2015 8:29:27 AM PDT · by Perseverando · 92 replies
    August 8, 2015 | Vanity
    Last weekend I loaded Windows 10 on an old laptop I rarely use. I immediately noticed several privacy issues with new open windows (pun intended) for spying on what I do, where I go and what I say online. After reading some to the reviews and discussions I think it's time to revert back to Windows 7 ASAP. Thanks, but no thanks Microsoft! The police state is doing a fine job without any additional help from you and me. I haven't turned the laptop on since I loaded Windows 10, but the next time I do, it will be for...
  • Spyware, Key Logger: Exoprience, Expertise Requested

    07/31/2015 8:02:12 PM PDT · by Hostage · 32 replies
    Self ^ | July 31, 2015 | Histage
    A neighbor's estranged Ex has possibly installed spyware and a key logger onto a new notebook given as a 'gift' to both neighbor and teenage daughter. The neighbor is the custodial parent of the one teenage daughter who recently received the new 'spy loaded' notebook computer from her estranged parent. The notebook runs Win 8.1 and is to be eventually upgraded to Windows 10. The teenager was told directly by the estranged parent that everything the custodial parent does could be seen and recorded and then messaged out clandestinely. The neighbor would like to know the following: 1. How to...
  • OS X Yosemite vs Windows 10: The Mac and PC operating systems go head to head UPDATED

    07/30/2015 11:45:36 PM PDT · by Swordmaker · 39 replies
    Macworld UK ^ | July 30, 2015, 2015 | by Keir Thomas
    OS X Yosemite vs Windows 10 It's been a rough few years for Microsoft.  Sure, it still makes more money than several European countries but the issue has been one of relevance. It missed the boat when it came to mobile and their efforts to repair the situation with Windows 8 were met with laughter at best, but sometimes even hatred.  The all-new Windows 10, which was released on 29 July, is designed to stem the blood loss. We took a look at the latest preview (Microsoft took the wraps off the new operating system at a developer event in...
  • Problems With Drudge Report?

    07/21/2015 5:59:16 PM PDT · by hulagirl · 35 replies
    Self ^ | 7/21/2015 | Self
    My own experience
  • Wow! DOS attack this past weekend in Michigan

    07/14/2015 3:12:03 AM PDT · by taildragger · 11 replies
    Email | N/A
    Dear Valued WOW! Customer, Please accept my sincere apology for any problems you may have recently experienced with your WOW! Internet service. On Sunday, 07/12, 2015, there was a malicious and coordinated action from an external party or parties that disrupted Internet service for our Michigan customers. What happened is known in technical circles as a Denial of Service or DOS attack. Essentially, these external sources intentionally overloaded the servers we use to route Internet traffic and created the access problems you may have experienced. As soon as the issue was detected, our engineers and technicians were immediately dispatched to...
  • Computer hack reveals identity of Syrians in contact with Israel

    07/12/2015 10:16:23 PM PDT · by Nachum · 9 replies
    Times of Israel ^ | 7/12/15 | Elhanan Miller
    Computer hackers likely working for the Syrian regime and Hezbollah have managed to penetrate the computers of Israeli and American activists working with the Syrian opposition, exposing sensitive contacts between the sides. Al-Akhbar, a newspaper serving as Hezbollahs mouthpiece in Lebanon, published a series of articles over the weekend purporting to divulge correspondence between Mendi Safadi, a Druze Israeli and former political adviser to Deputy Regional Cooperation Minister Ayoub Kara, with members of the Syrian opposition around the world, taken from taken from Safadis computer. The article also contains screenshots of word documents and text message exchanges saved on Safadis...
  • Why Googles nightmare AI is putting demon puppies everywhere

    07/11/2015 11:38:58 AM PDT · by Lazamataz · 203 replies
    Washington Post ^ | Jul 8, 2015 | by Jeff Guo
    A few weeks ago, Google researchers announced that they had peered inside the mind of an artificial intelligence program. What they discovered was a demonic hellscape. Youve seen the pictures. These are hallucinations produced by a cluster of simulated neurons trained to identify objects in a picture. The researchers wanted to better understand how the neural network operates, so they asked it to use its imagination. To daydream a little. At first, they gave the computer abstract images to interpret like a field of clouds. It was a Rorschach test. The artificial neurons saw what they wanted to see,...
  • Animal brains connected up to make mind-melded computer

    07/09/2015 8:45:15 AM PDT · by Red Badger · 10 replies
    www.newscientist.com ^ | 14:38 09 July 2015 | by Jessica Hamzelou
    Two heads are better than one, and three monkey brains can control an avatar better than any single monkey. For the first time, a team has networked the brains of multiple animals to form a living computer that can perform tasks and solve problems. If human brains could be similarly connected, it might give us superhuman problem-solving abilities, and allow us to communicate abstract thoughts and experiences. "It is really exciting," says Iyad Rahwan at the Masdar Institute in Dubai, UAE, who was not involved in the work. "It will change the way humans cooperate." The work, published today, is...
  • No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and Its Nearly Unstoppable

    07/08/2015 6:56:44 PM PDT · by 2ndDivisionVet · 27 replies
    BGR ^ | July 8, 2015 | Zach Epstein
    Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You cant stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also wont help you protect yourself. Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesnt use conventional communications to pull off capers. Instead it reads radio waves emitted by your computers processor, and theres...
  • Artificial Intelligence Machine Gets Testy With Its Programmer

    06/29/2015 10:36:07 AM PDT · by Red Badger · 56 replies
    WSJ ^ | 1:56 pm ET Jun 26, 2015 | By Amir Mizroch
    Researchers have shown that machines are inching closer to self-learning, and perhaps even copping a little attitude. Over at Google, a computer program using a database of movie scripts was asked again and again by researchers to define morality. It struggles to do so, and in a conversation recorded by its human engineers, becomes exasperated and ends the conversation by lashing out at its human inquisitor. Heres part of the exchange, as related in a paper presented this week: Human: Tell me the definition of morality. Machine: I dont have ethics. Human: Look, I need help; I need to know...
  • Fed personnel agency admits history of security problems

    06/16/2015 9:52:46 AM PDT · by Enterprise · 2 replies
    juno-news.com ^ | 6/16/2015 | KEN DILANIAN
    An Office of Personnel Management investigative official said Tuesday the agency entrusted with millions of personnel records has a history of failing to meet basic computer network security requirements.Michael Esser, assistant inspector general for audit, said in testimony prepared for delivery that for years many of the people running the agency's information technology had no IT background.
  • Google Wants to Turn Your Clothes Into a Computer

    05/30/2015 6:15:31 AM PDT · by Enlightened1 · 11 replies
    NY Times ^ | 05/29/15 | Conor Dougherty
    On Friday, the second day of its annual developer conference, Google I/O, one of the search giants semi-secretive research divisions announced a project that aims to make conductive fabrics that can be weaved into everyday clothes. The effort, called Project Jacquard, is named for the French inventor of the Jacquard Loom, which revolutionized textile manufacturing and helped pave the way for modern computing. Much like the screens on mobile phones, these fabrics could register the users touch and transmit information elsewhere, like to a smartphone or tablet computer. They are made from conductive yarns that come in a rainbow of...
  • Police explode briefcase left for literary agent

    08/11/2011 3:07:03 PM PDT · by NormsRevenge · 12 replies
    Mercury news ^ | 8/11/11 | AP
    BEVERLY HILLS, Calif. A writer desperate to get a movie script read suffered the ultimate rejection Thursday when police blew up a briefcase he said contained the screenplay after an agent refused to read it, police said. The bizarre story was set in Beverly Hills, where a man visited the office of a literary agent and left behind a briefcase that he said contained a computer, police Sgt. Brad Cornelius said. The man left instructions for it to be delivered to someone at the business, who told another person in the office, "This guy's been kind of pestering me...
  • New maze-like beamsplitter is world's smallest

    05/25/2015 4:57:28 PM PDT · by aimhigh · 50 replies
    Physics World ^ | 05/25/2015 | Ker Than
    An ultracompact beamsplitter the smallest one in the world has been designed and fabricated by researchers in the US. Using a newly developed algorithm, the team built the smallest integrated polarization beamsplitter to date, which could allow computers and mobile devices of the future to function millions of times faster than current machines.
  • Critical vulnerability in NetUSB driver exposes millions of routers to hacking

    05/20/2015 9:48:26 PM PDT · by Utilizer · 13 replies
    ITworld.com ^ | May 19, 2015 | Lucian Constantin
    Millions of routers and other embedded devices are affected by a serious vulnerability that could allow hackers to compromise them. The vulnerability is located in a service called NetUSB, which lets devices connected over USB to a computer be shared with other machines on a local network or the Internet via IP (Internet Protocol). The shared devices can be printers, webcams, thumb drives, external hard disks and more. NetUSB is implemented in Linux-based embedded systems, such as routers, as a kernel driver. The driver is developed by Taiwan-based KCodes Technology. Once enabled, it opens a server that listens on TCP...
  • 10 Keyboard Hacks That Will Change Your Life

    05/20/2015 10:54:01 AM PDT · by lulu16 · 38 replies
    Refinery 29 ^ | 5/20/15 | Christina Bonnington
    Turns out, there are a few savvy (and super-easy) keyboard tricks that can do just that. Your desktop, browser, Gmail, and even Facebook all have simple keyboard-based shortcuts you can press to more quickly accomplish things you do all the time things like creating a new tab in Chrome or favoriting a tweet. Weve rounded up 10 super-handy keyboard hacks that will help you zip through your daily grind, so you can spend more time on things that matter or at least save your index finger from repetitive stress syndrome. And, we've organized them from the most basic...
  • Funds sought for tiny 6 computer

    05/12/2015 4:13:25 AM PDT · by WhiskeyX · 9 replies
    BBC ^ | 11 May 2015 | BBC
    A Californian start-up is seeking funding to make a computer that will cost $9 (6) in its most basic form. Next Thing wants $50,000 to finish development of the credit-card sized Chip computer. The first versions will have a 1Ghz processor, 512MB of Ram and 4GB of onboard storage. The gadget, due to go on general release in early 2016, could become yet another rival to the popular Raspberry Pi barebones computer.
  • The number glitch that can lead to catastrophe

    05/06/2015 7:28:17 AM PDT · by BenLurkin · 20 replies
    BBC ^ | Chris Baraniuk
    Such glitches emerge with surprising frequency. Its suspected that the reason why Nasa lost contact with the Deep Impact space probe in 2013 was an integer limit being reached. And just last week it was reported that Boeing 787 aircraft may suffer from a similar issue. The control unit managing the delivery of power to the planes engines will automatically enter a failsafe mode and shut down the engines if it has been left on for over 248 days. Hypothetically, the engines could suddenly halt even in mid-flight. The Federal Aviation Administrations directive on the matter states that...
  • Why Coding Is Your Childs Key to Unlocking the Future

    04/29/2015 7:26:19 AM PDT · by Borges · 43 replies
    WSJ ^ | 4/29/2015 | CHRISTOPHER MIMS
    Racing across the U.S. in your taco truck, you must fight off animals mutated by fallout from a nuclear war, and you must also turn them into delicious filling for the tacos you sell inside fortified towns. Your mission: Make it to the Canadian city of Winnipeg. You are Gunman Taco Truck. Its pretty much only a game that a kid would come up with, says Brenda Romero, a videogame designer for more than 30 years and the mother of Donovan Romero-Brathwaite, the 10-year-old inventor of the game. And yet GTT already has been licensed by a videogame publisher for...
  • Beyond the lithium iona significant step toward a better performing battery

    04/17/2015 2:27:18 PM PDT · by Red Badger · 14 replies
    Phys.Org ^ | 04-17-2015 | Provided by University of Illinois at Chicago
    The race is on around the world as scientists strive to develop a new generation of batteries that can perform beyond the limits of the current lithium-ion based battery. Researchers at the University of Illinois at Chicago have taken a significant step toward the development of a battery that could outperform the lithium-ion technology used in electric cars such as the Chevy Volt. They have shown they can replace the lithium ions, each of which carries a single positive charge, with magnesium ions, which have a plus-two charge, in battery-like chemical reactions, using an electrode with a structure like those...
  • Engineer improves rechargeable batteries with MoS2 nano 'sandwich'

    04/17/2015 2:21:31 PM PDT · by Red Badger · 7 replies
    Phys.Org ^ | 04-17-2015 | Provided by Kansas State University
    Molybdenum disulfide sheets -- which are "sandwiches" of one molybdenum atom between two sulfur atoms -- may improve rechargeable lithium-ion batteries, according to the latest research from Gurpreet Singh, assistant professor of mechanical and nuclear engineering. Credit: Kansas State University The key to better cellphones and other rechargeable electronics may be in tiny "sandwiches" made of nanosheets, according to mechanical engineering research from Kansas State University. Gurpreet Singh, assistant professor of mechanical and nuclear engineering, and his research team are improving rechargeable lithium-ion batteries. The team has focused on the lithium cycling of molybdenum disulfide, or MoS2, sheets, which Singh...
  • Tech Ping: Bought the Computer, Trying to Do Wireless File Transfer HELP!!

    04/14/2015 4:57:49 PM PDT · by Chickensoup · 87 replies
    04.14.15 | chickensoup
    Tech Ping: Bought the Computer, Trying to Do Wireless File Transfer HELP!! Is there any help out there for Win7 among the Freepers? Wanted to file transfer from the old WIN 7 machine to the new WIN7 machine and the new computer wont recognize the old computer and vice versa. Both computers I think have the same name, could that be a problem. The old computer has a home group and the new computer keeps trying to make its own home group, the hussy! The last legs are rapidly approaching for old computer Last conversation was this: Question about Laptop...
  • 8th Grader Faces Felony Charges for Changing Teachers Computer Background

    04/13/2015 1:19:58 PM PDT · by yuffy · 39 replies
    Time.com ^ | April 10, 2015 | Laura Stampler
    Pranksters be warned Eight-grader Domanik Green was arrested on felony charges in Holiday, Fla. Wednesday after breaking into his teachers computer to change the background picture to two men kissing. Green, 14, who was released the day of his arrest, said that he broke into the computer of teacher he didnt like after realizing that faculty members passwords were simply their last names, the Tampa Bay Times reports. Green, who previously faced a three-day suspension for a similar prank, said that many students got in trouble for breaking into teachers computers.
  • Are smartphones making our children mentally ill?

    03/22/2015 7:01:34 AM PDT · by CharlesOConnell · 58 replies
    Telegraph UK ^ | 7:00AM GMT 21 Mar 2015 | By Peter Stanford
    Are smartphones making our children mentally ill?Leading child psychotherapist Julie Lynn Evans believes easy and constant access to the internet is harming youngsterstelegraph.co.uk/news/health/children/11486167/Are-smartphones-making-our-children-mentally-ill.html
  • Chromium Hack : special 13 character can crash Chrome Browser Tab on a Mac PC

    03/21/2015 7:36:39 PM PDT · by Utilizer · 30 replies
    TechWorm ^ | on March 21, 2015 | Vijay
    No browsers are safe as proved yesterday at Pwn2Own, but crashing one of them with just one line of special code is slightly different. A developer has discovered a hack in Google Chrome which can crash the Chrome tab on a Mac PC. The code is a 13 character special string which appears to be written in Assyrian script *break* Matt C has reported the bug to Google, who have marked the report as duplicate. This means that Google are aware of the problem and are reportedly working on it.
  • Cambridge Consultants reveal worlds first all-digital radio transmitter

    03/13/2015 2:31:47 PM PDT · by Red Badger · 12 replies
    www.theengineer.co.uk ^ | 03-13-2015 | By Julia Pierce
    The worlds first fully digital radio transmitter has been developed by Cambridge Consultants, paving the way for 5G high-speed broadband for mobile devices. Unlike software-defined radio (SDR), the breakthrough named Pizzicato is not a mixture of analogue and digital components but is completely digital, which can enable new ways of using the radio spectrum intelligently. When transmitting data, only low frequency signals of 1GHz or lower propagate well over distance or through walls, so they are in great demand. Expanding to make use of frequencies of 10GHz and beyond will require techniques such as meshing and beamforming...
  • Chinese immigrant spared prison for Chicago Merc trade secrets theft

    03/09/2015 5:41:50 PM PDT · by george76 · 9 replies
    Chicago Sun Times ^ | 03/03/2015 | Kim Janssen
    A Chinese immigrant who stole trade secrets from the Chicago Merc worth an estimated $50 million was spared prison Tuesday by a federal judge who cited his otherwise exemplary life. Chunlai Yang, 50, of Libertyville, was instead sentenced to just four years probation for stealing software that underpinned the CME Groups Globex trading platform. Yang, who worked as a high-ranking programmer for the Merc from 2000 until his arrest in 2011, pleaded guilty in 2012 to the theft, admitting he was trying to create a similar product in China when he illegally downloaded more than 10,000 computer source code files....
  • Intel: Moore's Law will continue through 7nm chips

    02/22/2015 4:47:42 PM PST · by ckilmer · 57 replies
    pcworld.com ^ | Feb 22, 2015 12:00 PM | Mark Hachman
    Eventually, the conventional ways of manufacturing microprocessors, graphics chips, and other silicon components will run out of steam. According to Intel researchers speaking at the ISSCC conference this week, however, we still have headroom for a few more years. Intel plans to present several papers this week at the International Solid-State Circuits Conference in San Francisco, one of the key academic conferences for papers on chip design. Intel senior fellow Mark Bohr will also appear on a panel Monday night to discuss the challenges of moving from today's 14nm chips to the 10nm manufacturing node and beyond.
  • The Unending High-Frequency Rip-Off

    02/17/2015 7:31:08 AM PST · by alexmark1917 · 19 replies
    This is an update to article written a few years ago. Everybody knows that retail and institutional investors are usually late to a trade. When they decide to buy, the wise guys are distributing or selling their shares to them and locking in their gains. When they sell, the wise guys are accumulating or buying their shares from them, again locking in their gains. How do the wise guys pull it off? The answer lies in the combination of reflexive human behavior and the use of high frequency, algorithmic (HFA) trading. With the advance of computer trading on a massive...
  • Computers with consciousness: Stanley Kubrick

    01/29/2015 11:00:31 AM PST · by Reverend Saltine · 21 replies
    Jon Rappoport's Blog ^ | January 29, 2015 | Jon Rappoport
    Computers have as much consciousness as cars or concrete. This will not change. Theyre machines. They can be programmed to follow directions and calculate certain kinds of solutions within those directed parameters. Thats it. Thats the beginning and end of the story. Why do some technocrats believe computers will gain actual consciousness? They think a) the brain is a machine that expresses consciousness via information processing, and b) information processing is all the consciousness there is. To sum up, technocrats are high-IQ idiots. You can assemble all the information in the world and cross-reference it 100 billion different ways; you...
  • Taiwanese man dies after three-day computer gaming binge

    01/19/2015 9:22:36 AM PST · by golux · 6 replies
    UPI ^ | Jan. 19, 2015 | Amy Connolly
    KAOHSIUNG, Taiwan, Jan. 19 (UPI) -- A Taiwanese man who was on a three-day computer gaming binge died in an Internet cafe and went unnoticed for hours, the second such death in the area in less than a month. The man, identified as Hsieh, went into the Internet cafe on Jan. 6 and was found motionless on a table on Jan. 8. Investigators said the man had a heart attack. His death went unnoticed for several hours as gamers continued around him. "The CCTV footage from the Internet cafe showed that he had a small struggle before he collapsed motionless,"...
  • easiest non-cloud backup for tech novices?

    01/08/2015 3:36:14 PM PST · by TurboZamboni · 35 replies
    me | 1-8-15 | TZ
    wanted for a dying laptop.
  • If you sign out of G Mail does google still track you?

    12/25/2014 5:51:08 AM PST · by dennisw · 60 replies
    self | Dec 25 | self
    One of my New Years resolutions is to not stay signed into Google mail or Google anything// Does this help with the tracking google does? I use track me not on Firefox and Chrome. I am using Bing and Google for searches Thanks
  • Dangerous 'Misfortune Cookie' flaw discovered in 12 million home routers

    12/19/2014 9:29:02 PM PST · by Swordmaker · 23 replies
    PCWorld ^ | December 19, 2014 | By John E. Dunn
    Researchers at Check Point have discovered a serious security vulnerability affecting at least 12 million leading-brand home and SME routers that appears to have gone unnoticed for over a decade. Dubbed the Misfortune Cookie flaw, the firm plans to give a detailed account of the issue at a forthcoming security conference but in the meantime its important to stress that no real-world attacks using it have yet been detected. That said, an attacker exploiting the flaw would be able to monitor all data travelling through a gateway such as files, emails and logins and have the power to infect connected...
  • Advice please: Dumping gmail and looking for email recommendations (Vanity)

    11/06/2014 1:59:06 PM PST · by tang-soo · 29 replies
    Self ^ | 11/6/2014 | Myself
    After about 10 years with gmail.com, I've decides to migrate to a new email address. I figure it will take few months, and will insert a forward rule in my current gmail account. I'd like to find another free provider if possible. I don't mind using a service that wraps advertising around received message, but I don't want to use a provide that wraps around sent messages. I know about reagan.com but they charge. I know they advertise explicitly that they do not browse messages for social engineering, advertising ... etc. That attracts me and if I do choose a...
  • How to protect OS X from the rootpipe vulnerability

    11/04/2014 7:32:21 PM PST · by Swordmaker · 19 replies
    Mac Issues ^ | November 4, 2014 | by Topher Kessler
    A relatively long-standing vulnerability in OS X has been uncovered by a Swedish hacker, Emil Kvarnhammar, who has dubbed it rootpipe by the so-far undisclosed method in which it can be used to take control of your Mac. In this vulnerability, a flaw allows a hacker to gain administrative access of a system without supplying a password, and then be able to interact with your Mac as an administrator. In an interview with MacWorld, Kvarnhammar describes this bug as having been present in OS X 10.8.5, but he was not able to replicate it in 10.9; however, Apple has shuffled...
  • Googles New Computer With Human-Like Learning Abilities Will Program Itself

    10/29/2014 1:56:10 PM PDT · by Red Badger · 43 replies
    betabeat.com ^ | 10/29 3:22pm | By Sage Lazzaro
    The new hybrid device might not need humans at all. In college, it wasnt rare to hear a verbal battle regarding artificial intelligence erupt between my friends studying neuroscience and my friends studying computer science. One rather outrageous fellow would mention the possibility of a computer takeover, and off they went. The neuroscience-savvy would awe at the potential of such hybrid technology as the CS majors argued we have nothing to fear, as computers will always need a programmer to tell them what to do. Todays news brings us to the Neural Turing Machine, a computer that will combine the...
  • Ex-CBS reporter: Government agency bugged my computer {Sharyl Attkinson]

    10/27/2014 7:24:48 AM PDT · by SeekAndFind · 35 replies
    New York Post ^ | 10/27/2014 | By Kyle Smith and Bruce Golding
    A former CBS News reporter who quit the network over claims it kills stories that put President Obama in a bad light says she was spied on by a government-related entity that planted classified documents on her computer. In her new memoir, Sharyl Attkisson says a source who arranged to have her laptop checked for spyware in 2013 was shocked and flabbergasted at what the analysis revealed. This is outrageous. Worse than anything Nixon ever did. I wouldnt have believed something like this could happen in the United States of America, Attkisson quotes the source saying. She speculates that the...
  • U.S. Homeland Security contractor reports computer breach (Illegal aliens not mentioned)

    08/06/2014 8:16:01 PM PDT · by Libloather · 7 replies
    MSN ^ | 8/06/14
    WASHINGTON (Reuters) - A company that performs background checks for the U.S. Department of Homeland Security said on Wednesday it was the victim of a cyber attack, adding in a statement that "it has all the markings of a state-sponsored attack." The computer breach at Falls Church, Virginia-based US Investigations Services (USIS) probably involved the theft of personal information about DHS employees, according to the Washington Post, which first reported the story. DHS has suspended all work with the company amid an investigation by the FBI, the Post reported. A U.S. government official confirmed to Reuters that the FBI is...
  • Why any decent website doesn't know your password. (video)

    08/06/2014 7:24:21 AM PDT · by servo1969 · 10 replies
    dump.com ^ | 8-6-2014 | Tom Scott
    A brief introduction to password hashing for the uninitiated -- and why you should never trust a site that emails your password back to you!
  • Visit the Wrong Website, and the FBI Could End Up in Your Computer

    08/05/2014 10:18:32 PM PDT · by Utilizer · 58 replies
    W I R E D ^ | 08.05.14 6:30 am | Kevin Poulsen
    Apparently, the feebs have been using malware and the TOR network to snoop on quite a bit more information than one might have suspected. Use the following link here for more info: http://www.wired.com/2014/08/operation_torpedo/
  • This thumbdrive hacks computers. BadUSB exploit makes devices turn evil

    07/31/2014 10:16:53 AM PDT · by Utilizer · 18 replies
    ars technica ^ | July 31 2014, 6:21am -0700 | Dan Goodin
    This thumbdrive hacks computers. BadUSB exploit makes devices turn evil Per FR posting rules, ars technica can not be posted, so a link to the article referring to USB thumbdrives hacking computers is listed instead. Ignore the "source url", it just points back to the FR website. Article here: http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/
  • moving all the data from one laptop to another...help

    07/13/2014 6:49:41 AM PDT · by TurboZamboni · 77 replies
    myself | 7-13-14 | TZ
    I was given the gift of a new laptop- HP Pavilion Smartouch 17. not my first choice, but it was a nice gift and the giver knew my old Toshiba Satellite L505-a6946 is dying and that I'm too cheap to buy a new one. The Satellite uses Vista and the new HP is Windows 8.1 . I need to know what's the best(easiest) way to move all my data from one to the other including AVG,Hitman Pro, Malwarebytes,emails(Outlook)and other vital programs. While I'm at it, I assume it came with all sorts of unwanted 'bloatware' so I will need to...
  • 19th century math tactic gets a makeoverand yields answers up to 200 times faster

    06/30/2014 10:09:28 AM PDT · by Red Badger · 14 replies
    Phys.Org ^ | 06-30-2014 | Provided by Johns Hopkins University
    A relic from long before the age of supercomputers, the 169-year-old math strategy called the Jacobi iterative method is widely dismissed today as too slow to be useful. But thanks to a curious, numbers-savvy Johns Hopkins engineering student and his professor, it may soon get a new lease on life. With just a few modern-day tweaks, the researchers say they've made the rarely used Jacobi method work up to 200 times faster. The result, they say, could speed up the performance of computer simulations used in aerospace design, shipbuilding, weather and climate modeling, biomechanics and other engineering tasks. Their paper...
  • Need operating system suggestions for old laptop (Vanity)

    06/25/2014 10:02:22 AM PDT · by deoetdoctrinae · 58 replies
    Yours truly | 6/25/2014 | Me
    I'm trying to determine if it's worth messing with to find a different (and free) operating system for my very old Dell Latitude laptop. It currently has Windows XP SP3, which of course Microsoft no longer supports.
  • 7 Hard Drives Failing: What are the odds? These are the odds. [IRS SCANDAL]

    06/24/2014 1:29:22 PM PDT · by QT3.14 · 57 replies
    American Digest ^ | June 22, 2014 | Gerard Vanderleun
    I run a data center. Disk drives that are left running continuously last between two and three years. Three years is about 36 months. The odds of a disk failing in any given month are roughly one in 36. The odds of two different drives failing in the same month are roughly one in 36 squared, or 1 in about 1,300. The odds of three drives failing in the same month is 36 cubed or 1 in 46,656. The odds of seven different drives failing in the same month is 37 to the 7th power = 1 in 78,664,164,096.
  • Did Lois Lerner have laptop, blackberry

    06/20/2014 9:09:11 AM PDT · by airedale · 58 replies
    vanity
    We know that Lois Lerner' s computer crashed at some time and per this morning it was just before "she learned of the rogue agents in Cincinnati." Since she was a fairly high level employee whose job required travel did she have a laptop? The way they describe their email system (not the way most systems work) not only would the desktop which crashed have a complete copy of all e-mails both incoming and outgoing so would the laptop. If she did have a laptop did it crash as well; did the agency give it to another employee at some...
  • The Tuesday List - Ten Inventions That Changed The World

    06/17/2014 11:35:24 AM PDT · by Scoutmaster · 66 replies
    Stuff of Genius ^ | June 24, 2013 | Ed Grabianowski
    If you think that the world's greatest inventions came from the fevered minds of solitary geniuses, think again. As you scan this list of the 10 inventions that changed the world, note how many of them perfected workable designs. 10. Plow Compared to some of the gleaming, electronic inventions that fill our lives today, the plow doesn't seem very exciting. It's a simple cutting tool used to carve a furrow into the soil, churning it up to expose nutrients and prepare it for planting. Yet the plow is probably the one invention that made all others possible. No one knows...